Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
2648cb6d8c98b6485c7e5cb14569aa1b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2648cb6d8c98b6485c7e5cb14569aa1b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2648cb6d8c98b6485c7e5cb14569aa1b_JaffaCakes118.html
-
Size
13KB
-
MD5
2648cb6d8c98b6485c7e5cb14569aa1b
-
SHA1
a14391f5de86c5df8792c1ce9a7ee416caa26903
-
SHA256
1707da134e08d664dad240d58ef1283295225075d0818602cf91545fa20889f9
-
SHA512
2e353fc17a75e2c254be304a8c9d8be4ba86a44e5c5715c5d1cdc653e4d1b44f6ac458e49041b42ae511066f351b89448a4d28e1d0c34fad8653f9303c55264d
-
SSDEEP
192:Id3MVHAgCFJQkdOkT3LR0bwyBFvQHsZcPaWLK81gnSHeGMZJB798n/0lOslxzc:I+pkT3LScynYXPaWLK81gS+dZJRR6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 1236 msedge.exe 1236 msedge.exe 2232 identity_helper.exe 2232 identity_helper.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2332 1236 msedge.exe 85 PID 1236 wrote to memory of 2332 1236 msedge.exe 85 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4004 1236 msedge.exe 86 PID 1236 wrote to memory of 4212 1236 msedge.exe 87 PID 1236 wrote to memory of 4212 1236 msedge.exe 87 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88 PID 1236 wrote to memory of 2404 1236 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2648cb6d8c98b6485c7e5cb14569aa1b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa597347182⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14789085256327769811,14147410424191654102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5f6bda808bc1225600db1aabb0a213f83
SHA1eabfdbe92b54f3d4784600bd48cd0e0d6be315a4
SHA2565db7abb95b025af43066993f6371df6096d5aa3c5458e9be167d1dc940e9ef9c
SHA512d5e8beebaeab943f566ecad655435c34d1d439e9907b171eb17e8d3759850f3c78c93183546082438b91f8d120ecf53584d45fa4d41692e7e9ff06ec0edd1a6e
-
Filesize
486B
MD57954373e4e249831e594ca11acbfc898
SHA1dc0d65ee2206f369ef95c6f0df68dbf34ceafb4b
SHA256ce219d73207f71d2615f1c2ebf1c4eb1760691af81b1005ecd3f162c608e65a6
SHA512130e45ada4d1fbd2341e2d83996721ae117bfaf6d51d4b7202ef2efe29e0119ccea003deb7f49a48425954363edf2b4359e97b053ce46c447b90ccf6390c1834
-
Filesize
6KB
MD586d81b107b2a17a2db355b7bb0073d0f
SHA152e3cc0007c23f9fa508dc28037958877dd33d81
SHA256fe3f1a6f745ec654f56f037d586877dba6d5809070a4db0d54b97c9bbebc80ff
SHA51208fe1bf97f007e78330a7aded1f7df1c7654afc0d171cf3899f8f7c61469b4c481f8f30b17a11692962975e7edd4e099982edcada640af92d83735da36c8adac
-
Filesize
7KB
MD5412e5dc27b4f644e4beb5b506f885a1a
SHA1274b3c668ca09cf3493cd449eb7fa452db4a1a2c
SHA256c14359c0ca5a697f6f303ef46137b1e88c532a98feae00e74c680648db0c83e8
SHA512df87cef92f33fcc52ed6558c8379516b816111e59a2ee9f2a9f9168cf18a2a12f51e528954d52cad55ffee1df78cec2fb1bd197a2a9080f980cd8083776628b1
-
Filesize
875B
MD5a70358497e7f886cdc5c42d74ababbb5
SHA17cff51181c8864c02ec9f3a67ccf3ba1d361bd91
SHA256218854ab47dc729fe3b7850b091f048dd3e81ebb574fc1a481ba8e8c3f834e52
SHA5120dd01459f1ab3c68d82fd7ee021e4299eaea31c3d1d3afc8b118a32026762d12bf33b1886a9c77db347e0d830f6ae017b7892700ea78bfb9a18569842528cc91
-
Filesize
875B
MD5088bc2f77b8589c65da34fee7eb67207
SHA15471c42d03d8dd440b1e68b595cd00ac45fe035d
SHA2562f6c65d8447d4fdb20f5d411b53565deb2df0c775c7d0ebc2566e4094934d215
SHA512f29280722b3ed2b2fd0d389bb9ed6af74a5fa36adc76295a6faf157b91b165cd43cf9db0ca0078043afebacc314fd6061b0ca794a7b094919dc07b44b15805ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f7eeebe5985a3958fdd292f7c2d2ab05
SHA14289732b165737e9eb966c7a5273420110a01b24
SHA256aca917a71bb34d8bc8cd1cf507d52d7eb54dc54bfb2d421e52015de9e0d2f5bb
SHA512050ea5a91fe05fbacb6c414db3d47cf65c68b9b9e7589f7d796265fdf9e8ee3be2c8b153e3e64ebe2e36b9f84846c1c1b30f20578f73788cba743c998c1ba585